Remove Cyber Risk Remove Digital transformation Remove Event Remove Technology
article thumbnail

Lunch and Learn: How to Introduce Cyber Risk Quantification (CRQ) to Your Organization

Security Boulevard

A successful quantitative cyber risk management program begins with lunch ā€“ more specifically, a Lunch ā€˜nā€™ Learn or other roadshow event to introduce to stakeholders the concepts, benefits, and practical details of launching a CRQ program or capability. What Is Cyber Risk Quantification?

article thumbnail

Spotlight Podcast: RSA President Rohit Ghai warns Digital Transformation is magnifying Enterprise Risk

The Security Ledger

In this interview, recorded at the RSA* Charge conference, RSA President Rohit Ghai talks about some of the ways that digital organizations have to adapt to- and address risks introduced by new transformative technologies like machine learning, multi cloud environments and robotics and other "digital transformation" initiatives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: Managing the Digital Risk in your Digital Transformation

The Security Ledger

Companies are pursuing digital transformation at all costs. But do they really understand the risks lurking in their digital transformation strategies? Companies are pursuing digital transformation at all costs. Re-Thinking Cyber Risk. The post Spotlight Podcast: Read the whole entry. »

article thumbnail

MY TAKE: Log4jā€™s big lesson ā€“ legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later. Log4j, for instance, is a ubiquitous logging library.

Firewall 223
article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ā€˜case-managementā€™ approach to threat detection

The Last Watchdog

There is a gaping shortage of analysts talented enough to make sense of the rising tide of data logs inundating their SIEM (security information and event management) systems. Now toss in the fact that digital transformation is redoubling software development and data handling complexities. But this hasnā€™t done the trick.

article thumbnail

Has ESG Become aWake-Up Call for Cybersecurity?

Security Boulevard

Highly experienced cybersecurity experts, experienced personnel with a cyber risk management background, and professional engineers who understand physical infrastructure are in huge demand. Maintaining these critical resources directly impacts the organizationā€™s risk scoring. How would these events impact the ESG score?

article thumbnail

RSA Conference 2022 Back to Physical - The Thrill of Meeting in Person!

Thales Cloud Protection & Licensing

However, the event will also be online for those who cannot be there in person. As the world changes and new technologies emerge, shaping our future, being able to secure these advances and offer a safer digital landscape is of crucial importance. Personal interaction is the great thing about attending a physical event.